QID 316949

Date Published: 2021-06-10

QID 316949: Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability(cisco-sa-esa-wsa-sma-info-RHp44vAC)

A vulnerability in the authentication for the general purpose APIs implementation of Cisco Email Security Appliance (ESA),
Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA)
could allow an unauthenticated, remote attacker to access general
system information and certain configuration information from an affected device.

Affected Products
Cisco ESA, Cisco SMA, and Cisco WSA if they supported general purpose API. ESA Release From 13.0 Prior to 13.5.2 SMA Release From 12.5 Prior to 13.8.0 WSA Release From 11.8 Prior to 12.5.1

QID Detection Logic (Authenticated):
The check matches Cisco ESA OS version and Cisco SMA OS version retrieved via Unix Auth using "version" command.

A successful exploit could allow the attacker to obtain system and configuration information from the affected device, resulting in an unauthorized information disclosure.

  • CVSS V3 rated as Medium - 5.3 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution

    Customers are advised to refer to cisco-sa-esa-wsa-sma-info-RHp44vAC for more information.

    CVEs related to QID 316949

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-esa-wsa-sma-info-RHp44vAC URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-RHp44vAC